During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant...
Pentests & Security Analyses
Identifying Security Vulnerabilities in Mobile Device Management: Audit and Pentest?
Mobile offices and working from home have become integral parts of today's business world. But as the flexibility increases, so do the risks for...
Top 3 Vulnerabilities in Cloud Pentests
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant risks to...
Top 3 Vulnerabilities in API Pentests
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant...
Top 3 Vulnerabilities in SSO Pentests
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant risks to...
“SAP from an Attacker's Perspective”: usd Experts Speaking at German OWASP Day 2024
The German Chapter of the Open Worldwide Application Security Project (OWASP) is once again organizing its national conference this year. On...
Top 3 Vulnerabilites in System Pentests
During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant risks to...
search_vulns - Vulnerability Search Made Easy: The Story Behind the Community Tool
Obtaining a good overview of all known vulnerabilities for software products is often more difficult and complex than one might initially assume....
When Pentest Planning Becomes a Game of Tetris - A Look behind the Scenes of an Extensive Pentest Project with HanseMerkur
In a world where security and efficiency must go hand in hand, our recent project with HanseMerkur Krankenversicherung AG shows how crucial good...
usd AG Re-Accredited Worldwide as an Approved Scanning Vendor (ASV)
On 20.08.2024, we once again received worldwide accreditation as an Approved Scanning Vendor (ASV) for the scanning services of our usd PCI Platform...
Top 3 Vulnerabilities in AD Pentests
Today we look at the three most common security-critical vulnerabilities that our analysts have identified in Active Directory Pentests (AD Pentests) in recent years.
Coffee Break with Pentesters: 5 Questions about Black Hat & DEF CON 2024
“Have you heard? We can present the CSTC at Black Hat again.” - This or something similar is how a chat at the coffee machine between Matthias...











